{"title":"变换域技术:数字图像的鲁棒水印","authors":"S. Suthaharan, S. Sathananthan","doi":"10.1109/SECON.2000.845602","DOIUrl":null,"url":null,"abstract":"A digital image watermarking technique that is based on the human visual system (HVS) characteristics and the statistical behavior of the edge structures is presented. In this technique the watermark is generated using (i) human visual system parameters so that the watermark does not alter the perceived quality (transparency requirement) of a watermarked image and (ii) a sequence of random numbers generated from a bounded normal distribution so that the technique is robust to malicious attacks. The watermarking technique inserts the watermark into the perceptually most significant discrete cosine transform (DCT) coefficients so that the technique is (i) robust to image processing operations (such as image compression), (ii) robust to malicious watermark attacks and (iii) perceptually invisible.","PeriodicalId":206022,"journal":{"name":"Proceedings of the IEEE SoutheastCon 2000. 'Preparing for The New Millennium' (Cat. No.00CH37105)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2000-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Transform domain technique: robust watermarking for digital images\",\"authors\":\"S. Suthaharan, S. Sathananthan\",\"doi\":\"10.1109/SECON.2000.845602\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A digital image watermarking technique that is based on the human visual system (HVS) characteristics and the statistical behavior of the edge structures is presented. In this technique the watermark is generated using (i) human visual system parameters so that the watermark does not alter the perceived quality (transparency requirement) of a watermarked image and (ii) a sequence of random numbers generated from a bounded normal distribution so that the technique is robust to malicious attacks. The watermarking technique inserts the watermark into the perceptually most significant discrete cosine transform (DCT) coefficients so that the technique is (i) robust to image processing operations (such as image compression), (ii) robust to malicious watermark attacks and (iii) perceptually invisible.\",\"PeriodicalId\":206022,\"journal\":{\"name\":\"Proceedings of the IEEE SoutheastCon 2000. 'Preparing for The New Millennium' (Cat. No.00CH37105)\",\"volume\":\"60 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2000-04-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the IEEE SoutheastCon 2000. 'Preparing for The New Millennium' (Cat. No.00CH37105)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SECON.2000.845602\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the IEEE SoutheastCon 2000. 'Preparing for The New Millennium' (Cat. No.00CH37105)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SECON.2000.845602","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Transform domain technique: robust watermarking for digital images
A digital image watermarking technique that is based on the human visual system (HVS) characteristics and the statistical behavior of the edge structures is presented. In this technique the watermark is generated using (i) human visual system parameters so that the watermark does not alter the perceived quality (transparency requirement) of a watermarked image and (ii) a sequence of random numbers generated from a bounded normal distribution so that the technique is robust to malicious attacks. The watermarking technique inserts the watermark into the perceptually most significant discrete cosine transform (DCT) coefficients so that the technique is (i) robust to image processing operations (such as image compression), (ii) robust to malicious watermark attacks and (iii) perceptually invisible.